First published: Tue Oct 08 2019(Updated: )
An issue was discovered in Xen through 4.11.x allowing x86 guest OS users to cause a denial of service or gain privileges because grant-table transfer requests are mishandled.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xen | 4.11.4+107-gef32c7afa2-1 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.2+76-ge1f9cb16e2-1~deb12u1 4.17.2+76-ge1f9cb16e2-1 | |
Xen xen-unstable | >=3.2.0<=4.11.2 | |
Debian GNU/Linux | =9.0 | |
Debian GNU/Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-17340 has been classified with a severity level that can lead to privilege escalation or denial of service in Xen hypervisor environments.
To fix CVE-2019-17340, upgrade your Xen installation to version 4.11.4+107-gef32c7afa2-1 or later, or to a patched release from the affected software vendor.
CVE-2019-17340 affects Xen versions from 3.2.0 up to and including 4.11.2.
CVE-2019-17340 requires access to the x86 guest OS, meaning it is not typically exploitable remotely without prior access.
CVE-2019-17340 can allow an unprivileged x86 guest OS user to escalate privileges or disrupt services on the Xen hypervisor.